In the Linux kernel, the following vulnerability has been resolved:kernfs: fix potential NULL dereference in __kernfs_removeWhen lockdep is enabled, lockdep_assert_held_write wouldcause potential NULL pointer dereference.Fix the following smatch warnings:fs/kernfs/dir.c:1353 __kernfs_remove() warn: variable dereferenced before check kn (see line 1346)
In the Linux kernel, the following vulnerability has been resolved:kernfs: fix potential NULL dereference in __kernfs_removeWhen lockdep is enabled, lockdep_assert_held_write wouldcause potential NULL pointer dereference.Fix the following smatch warnings:fs/kernfs/dir.c:1353 __kernfs_remove() warn: variable dereferenced before check kn (see line 1346)
In the Linux kernel, the following vulnerability has been resolved:kernfs: fix potential NULL dereference in __kernfs_removeWhenlockdep is enabled, lockdep_assert_held_write wouldcause potential NULL pointer dereference.Fix thefollowing smatch warnings:fs/kernfs/dir.c:1353 __kernfs_remove() warn:variable dereferencedbefore check kn (see line 1346)
A vulnerability classified as critical has been found in Linux Kernel up to 5.18.17/5.19.1 (Operating System).CWE is classifyingthe issue as CWE-476. A NULL pointer dereference occurs when the application dereferences a pointerthat it expects to be valid, but is NULL, typically causing a crash orexit.This is going tohave an impact onavailability.Upgrading to version 5.18.18 or 5.19.2 eliminates this vulnerability. Applying the patch b871986d9d3071f5082664ac274d93f08db257cd/4a9f35b8729c5bf13ea671c908c17ed74c48fc50/72b5d5aef246a0387cefa23121dd90901c7a691a is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability classified as critical has been found in Linux Kernel up to 5.18.17/5.19.1 (Operating System).CWE is classifyingthe issue as CWE-476. A NULL pointer dereference occurs when the application dereferences a pointerthat it expects to be valid, but is NULL, typically causing a crash orexit.This is going tohave an impact onavailability.Upgrading to version 5.18.18 or 5.19.2 eliminates this vulnerability. Applying the patch b871986d9d3071f5082664ac274d93f08db257cd/4a9f35b8729c5bf13ea671c908c17ed74c48fc50/72b5d5aef246a0387cefa23121dd90901c7a691a is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
In the Linux kernel, the following vulnerability has been resolved:kernfs: fix potential NULL dereference in __kernfs_removeWhenlockdep is enabled, lockdep_assert_held_write wouldcause potential NULL pointer dereference.Fix thefollowing smatch warnings:fs/kernfs/dir.c:1353 __kernfs_remove() warn:variable dereferencedbefore check kn (see line 1346)
In the Linux kernel, the following vulnerability has been resolved:kernfs: fix potential NULL dereference in __kernfs_removeWhenlockdep is enabled, lockdep_assert_held_write wouldcause potential NULL pointer dereference.Fix thefollowing smatch warnings:fs/kernfs/dir.c:1353 __kernfs_remove() warn:variable dereferencedbefore check kn (see line 1346)
A vulnerability classified as critical has been found in Linux Kernel up to 5.18.17/5.19.1 (Operating System).CWE is classifyingthe issue as CWE-476. A NULL pointer dereference occurs when the application dereferences a pointerthat it expects to be valid, but is NULL, typically causing a crash orexit.This is going tohave an impact onavailability.Upgrading to version 5.18.18 or 5.19.2 eliminates this vulnerability. Applying the patch b871986d9d3071f5082664ac274d93f08db257cd/4a9f35b8729c5bf13ea671c908c17ed74c48fc50/72b5d5aef246a0387cefa23121dd90901c7a691a is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability classified as critical has been found in Linux Kernel up to 5.18.17/5.19.1 (Operating System).CWE is classifying the issue as CWE-476. A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.This is going to have an impact on availability.Upgrading to version 5.18.18 or 5.19.2 eliminates this vulnerability. Applying the patch b871986d9d3071f5082664ac274d93f08db257cd/4a9f35b8729c5bf13ea671c908c17ed74c48fc50/72b5d5aef246a0387cefa23121dd90901c7a691a is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability classified as critical has been found in Linux Kernel up to 5.18.17/5.19.1 (Operating System).CWE is classifying the issue as CWE-476. A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.This is going to have an impact on availability.Upgrading to version 5.18.18 or 5.19.2 eliminates this vulnerability. Applying the patch b871986d9d3071f5082664ac274d93f08db257cd/4a9f35b8729c5bf13ea671c908c17ed74c48fc50/72b5d5aef246a0387cefa23121dd90901c7a691a is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
In the Linux kernel, the following vulnerability has been resolved:kernfs: fix potential NULL dereference in __kernfs_removeWhen lockdep is enabled, lockdep_assert_held_write wouldcause potential NULL pointer dereference.Fix the following smatch warnings:fs/kernfs/dir.c:1353 __kernfs_remove() warn: variable dereferenced before check 'kn' (see line 1346)The Linux kernel CVE team has assigned CVE-2022-50148 to this issue.
A vulnerability classified as critical has been found in Linux Kernel up to 5.18.17/5.19.1 (Operating System).CWE is classifyingthe issue as CWE-476. A NULL pointer dereference occurs when the application dereferences a pointerthat it expects to be valid, but is NULL, typically causing a crash orexit.This is going tohave an impact onavailability.Upgrading to version 5.18.18 or 5.19.2 eliminates this vulnerability. Applying the patch b871986d9d3071f5082664ac274d93f08db257cd/4a9f35b8729c5bf13ea671c908c17ed74c48fc50/72b5d5aef246a0387cefa23121dd90901c7a691a is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
In the Linux kernel, the following vulnerability has been resolved:kernfs: fix potential NULL dereference in __kernfs_removeWhen lockdep is enabled, lockdep_assert_held_write wouldcause potential NULL pointer dereference.Fix the following smatch warnings:fs/kernfs/dir.c:1353 __kernfs_remove() warn: variable dereferenced before check 'kn' (see line 1346)The Linux kernel CVE team has assigned CVE-2022-50148 to this issue.
In the Linux kernel, the following vulnerability has been resolved:kernfs: fix potential NULL dereference in __kernfs_removeWhenlockdep is enabled, lockdep_assert_held_write wouldcause potential NULL pointer dereference.Fix thefollowing smatch warnings:fs/kernfs/dir.c:1353 __kernfs_remove() warn:variable dereferencedbefore check kn (see line 1346)
In the Linux kernel, the following vulnerability has been resolved:kernfs: fix potential NULL dereference in __kernfs_removeWhen lockdep is enabled, lockdep_assert_held_write wouldcause potential NULL pointer dereference.Fix the following smatch warnings:fs/kernfs/dir.c:1353 __kernfs_remove() warn: variable dereferenced before check 'kn' (see line 1346)The Linux kernel CVE team has assigned CVE-2022-50148 to this issue.